(19)
(11) EP 4 161 161 A1

(12) EUROPEAN PATENT APPLICATION

(43) Date of publication:
05.04.2023 Bulletin 2023/14

(21) Application number: 21200404.8

(22) Date of filing: 01.10.2021
(51) International Patent Classification (IPC): 
H04W 48/18(2009.01)
H04W 8/18(2009.01)
H04W 12/06(2009.01)
(52) Cooperative Patent Classification (CPC):
H04W 48/18; H04W 8/18
(84) Designated Contracting States:
AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR
Designated Extension States:
BA ME
Designated Validation States:
KH MA MD TN

(71) Applicant: Deutsche Telekom AG
53113 Bonn (DE)

(72) Inventor:
  • Melander, Mari
    53225 Bonn (DE)

(74) Representative: Braun-Dullaeus Pannen Emmerling Patent- & Rechtsanwaltspartnerschaft mbB 
Platz der Ideen 2
40476 Düsseldorf
40476 Düsseldorf (DE)

   


(54) TECHNIQUES TO ENABLE EFFICIENT COMMUNICATION ESTABLISHMENT OF A USER DEVICE IN A ROAMING USE CASE


(57) Techniques to enable efficient communication establishment of a user device to a network in which an identifier associated to the user device is hosted, comprising the following steps:
• Providing to a first network a list of identifiers by a second network, wherein the list enumerates identifiers that are assigned to the second network but which are hosted by a third network;
• The first network receives a communication request from a user device requesting connectivity to the second network;
• The first network extracts an identifier associated to the user device and compares the extracted identifier with the list of identifiers and directs the communication request of the user device to the third network if the identifier associated to the user device is part of the list of identifiers.




Description


[0001] The invention relates to techniques to enable efficient communication establishment of a user device in a roaming use case. In particular, the invention relates to a method, a network entity, a further network entity and communication system to enable efficient communication establishment of the user device in a roaming use case.

[0002] When establishing communication connections within networks of one network provider and/or across different network providers it is important to direct a communication to the correct endpoint. This is for example very obvious if a first person tries to establish a telephone call with a second person. Roaming situations, i.e. when a starting point of the communication and an endpoint of the communication are located within different communication networks, can make this communication establishment even more complicated. A typical roaming situation is that a user has no access to his home network and tries to access his home network to run a service via a visited network in which he has communication access. The visited network then directs the communication from the visited network to the home network.

[0003] To facilitate this directing to the home network, in each communication request of a user device there is a unique identifier associated to it, wherein the unique identifier comprises an information about the network to which the unique identifier is assigned, which typically is the home network of the network provider. The identifier associated to the user device as described above is not an identifier of the user device itself like an IMEI but an identifier like an IMSI that identifies the subscription profile and can be stored on an eSIM. In other words, every network provider possesses a certain range of identifiers and every communication request of a user device having an identifier within this range will be directed to this very network.

[0004] However, it can happen, for example due to agreements between a network provider and another network provider and/or a company, that a subset of the range of identifiers that the network provider possesses shall not be directed to the home network of this network provider but to a different network, also called a third network, that is run by the other network provider and/or a company. In the context of this invention, this means that this subset of identifiers is hosted by the different network.

[0005] Especially in roaming situations this redirection causes problems, because if the visited network reads out the information of the identifier, it determines that it shall direct the communication to the home network and not to third network. For example, if the unique identifier is a so called IMSI: Examples of an IMSI: 262 01 9876543210: MCC 262 for Germany, MNC 01 for Telekom Deutschland, MSIN 9876543210 for the subscriber.

[0006] For 5G Stand Alone (SA) roaming it will be necessary to support IMSI/SUPI hosting scenarios, where the IMSI/SUPI belongs to one network, but is hosted in a different network. In legacy networks, e.g. 4G, such rerouting could be performed by entities interconnecting the networks (IPX), because the signaling is not encrypted. In 5G SA roaming, however, the connection is established between visited networks SEPP and home network SEPP and the signaling between VPLMN SEPP and HPLMN SEPP is encrypted, therefore any entity in between cannot execute rerouting of the signaling traffic. HPLMN means "Home Public Land Mobile Network", VPLMN means "Visited Public Land Mobile Network", and SEPP means "Security Edge Protection Proxy".

[0007] Hence, it is the task of the invention to provide efficient techniques to direct a communication, in particular a communication request in a flexible way to the network that hosts an identifier.

[0008] This object is solved by the features of the independent claims.

[0009] The features of the various aspects of the invention described below or the various examples of implementation may be combined with each other, unless this is explicitly excluded or is technically impossible.

[0010] In the following text passages, the invention is mainly described within the context of a user device to which the identifier is associated, i.e. the identifier identifies a subscription profile linked to the user device. The identifier can be stored in an eSIM of the user device. In general, this user device can be any device that is capable of connecting to a communication network. Examples are computers, smart phones, IOT devices, cars, etc.

[0011] According to a first aspect of the invention, a method is provided to enable efficient communication establishment of a user device to a network in which an identifier associated to the user device is hosted, comprising the following steps:
  • Providing to a first network a list of identifiers by a second network, wherein the list enumerates identifiers that are assigned to the second network, but which are hosted by a third network;

    ∘ in particular, the identifiers are unique identifiers and comprise information about the network of the network provider to which they "belong". So typically their requests for communication or certain services are directed to the network to which they are assigned and are executed on entities within that network; the network can comprise different servers to fulfill those tasks. Typically, the identifiers are hosted within the network to which they are assigned. However, as explained above, the invention describes a situation in which the identifiers are assigned to a network but they are actually hosted by a different network, namely the third network. In that sense, the assignment to a network is related to the information that can be extracted from the identifier, wherein the hosting is related to a network in which the services requested by the user device are actually executed. The user device can be equipped with a SIM or an eSIM card that stores the information about the identifier.

    ∘ The provided list of identifiers can also be a range of identifiers.

  • The first network receives a communication request from a user device to the second network;

    ∘ the communication request shall be understood technically in a broad way so that it can also be a service request of any kind that shall be executed on servers within the network;

    ∘ the request is directed to the second network because the information stored within the unique identifier carried by the user device specifies the second network as the network to which the identifier is assigned to;

  • The first network extracts an identifier associated to the user device, in particular associated to the request, and compares the extracted identifier with the list of identifiers and directs the communication request of the user device to the third network if the identifier associated to the user device is part of the list of identifiers.
    ∘ The third network can be hosted by a service provider, in particular by a third service provider.


[0012] This provides the advantage that, especially in roaming situations, the first network does not direct the request to the second network as it would normally do based on the information extracted from the unique identifier, but to a different network, namely the third network, that actually is executing services related to the identifier associated to the user device. This greatly reduces signaling traffic, in particular within the second network, which would otherwise receive the request and first needs to evaluate that the identifier is not hosted by the second network and then has to generate and send an answer to the first network to redirect the request to the third network instead. Another advantage is that providing this list of identifiers to the first network, the related information can be taken into account before the first network is performing an encryption which has the effect that any "redirecting" entity between networks will not be able to read and/or redirect the communication request. A further advantage is that this an efficient way of directing a request reduces latency effects within the communication. For example, with respect to autonomous driving, it is expected, that it is important to reduce latency as far as possible. Providing the list or the range of multiple identifiers provides the advantage that a request of a user device that is associated to one of the identifiers of the list can be directed to the correct network, in particular the third network, even if this user device requests communication within the first network for the first time.

[0013] In an embodiment, the list of identifiers comprises information about the third network. In particular, the information about the third network comprises information that can be extracted by the first network to direct the request to the third network. For example, the information can be a name and/or a destination, like an IP address and/or a URL and/or an FQDN of the SEPP, of the third network. A possible embodiment of the list is a table, wherein each identifier is listed in a row and additional information related to this identifier are listed in further columns. So it is possible to list an expiration time and/or the third network and/or other information in the respective columns for each identifier individually.

[0014] This provides the advantage that the first network can efficiently direct the request to the third network without the need to ask for further information. This again reduces signaling traffic.

[0015] In an embodiment, the list or the range of identifiers is provided by a service provider of the second network to a service provider of the first network.

[0016] This provides the advantage that only the service provider of the second network has the authority to specify which of the identifiers he possesses are actually hosted by a different network provider who runs the different network.

[0017] Hence, there are certain security measures implemented regarding an authorization of the communication between different service providers so that they can verify which service provider actually sent the list of identifiers. This greatly limits the possibility of misuse.

[0018] In an embodiment, the list of identifiers is provided from the second network to the first network upon receiving the communication request.

[0019] This provides the advantage of making the method more efficient because the second network provider does not know in advance to which of the many "first network" providers it shall send the list of identifiers. In that sense, the communication request leading to the providing of the list of identifiers can be a first communication request. It tells the second network provider that there is a distinct network provider out of many possible network providers that actually obtained a service request of an identifier that is not hosted by the second network provider. Of course, the second network provider could send the list to all possible roaming partners but this would cause a large amount of data traffic.

[0020] In an embodiment, the list of identifiers comprises expiration information about at least one of the identifiers.

[0021] This has the advantage that the second network provider can make a subset of his identifiers available to a third service provider not permanently, but only for a certain period of time. For example, the expiration information can comprise information that a certain identifier is hosted by the third network for a predefined period of time and/or for a predefined number of requests. To reduce the size of the list, an entry of identifier can be deleted after it has expired.

[0022] In an embodiment, the first network provider replaces the list of identifiers if the second network provider transmits a new list of identifiers.

[0023] This provides the advantage that the list of identifiers can be kept actual and represents the current situation of the identifiers regarding to which network actually hosts these identifiers.

[0024] In an embodiment, the first network is a VPLMN and the second network is a HPLMN, wherein the identifier associated to the user device belongs to the HPLMN.

[0025] This provides the advantage that communication requests in roaming scenarios can be efficiently directed to the network that actually hosts the services requested by the user device.

[0026] In an embodiment, the first network and the second network are 5G networks, in particular 5G core networks. The third network can also be a 5G Network.

[0027] This provides the advantage that the invention makes it possible to redirect communication requests efficiently within 5G networks which was previously not possible due to the encryption mechanisms that take place in the control plane of 5G networks when establishing a communication.

[0028] In an embodiment, the steps of the methods are executed by a SEPP of the respective network, in particular by a HPLMN SEPP and a VPLMN SEPP. In particular, the VPLMN SEPP does the extraction of identifiers of the user device, comparing the extracted identifier with the list of identifiers and/or directing the communication request of the user device to the third network if the identifier associated to the user device is part of the list of identifiers.

[0029] This provides the advantage that the invention makes use of the entity of the network that has the task to direct the communication request to the appropriate network. If the VPLMN SEPP also performs the extracting and comparing steps, this avoids additional signaling traffic within the first network. Since the SEPPs are at the outer border of each of the networks, they are especially suited for this task. A SEPP is a "Security Edge Protection Proxy" that authenticates and encrypts control plane traffic and sends it to a network of a roaming partner.

[0030] In an embodiment, the list of identifiers is stored within a database of the VPLMN SEPP.

[0031] In this way, the list of identifiers can be made permanently available for evaluation in an efficient manner.

[0032] In an embodiment, the list of identifiers of user devices is provided during a N32-c setup.

[0033] The N32-c is the Control Plane interface between the SEPPs of the VPLMN and the HPLMN for performing the initial handshake and negotiating the parameters to be applied for the actual N32 message forwarding, (see for example section 4.2.2 of 3GPP TS 29.573) Because the providing of the identifiers can be done during the initial handshake, it is done at a very early stage which makes this feature very efficient because unnecessary computational load is avoided. It can be compared to the situation that it is best to tell a person as soon as possible that he took a wrong route when navigating with his car.

[0034] The N32-c is independent from any identifier, e.g. IMSI/SUPI. The list or range of the identifiers can be included in one of the messages during the N32-c connection setup or it can be provided by a separate message. The list or the range of identifiers can be a new HTTP header, or a new information element in the HTTP body, which is a JSON object. In particular, the VPLMN SEPP receives the list of identifiers with the URL of the third SEPP. The VPLMN SEPP stores this range, and for further connections for subscribers from this range, it would directly connect the alternative SEPP, wherein the alternative SEPP is the SEPP of the third network. The expiration time of the identifiers can also be carried in the HTTP response.

[0035] In an embodiment, the list of identifiers is provided during a N32-f setup.

[0036] The N32-f is the Forwarding interface between the SEPPs, that is used for forwarding the communication between the Network Function (NF) service consumer and the NF service producer after applying the application level security protection. (see section 4.2.3 of 3GPP TS 29.573)

[0037] The range of identifiers can be sent during the N32-f setup, e.g. in HTTP 300 redirect response to a HTTP request for a particular identifier, in particular a IMSI/SUPI. The identifier range could be a new HTTP header, or a new information element in the HTTP body, which is a JSON object. The VPLMN SEPP can receive the identifier IMSI/SUPI range with the URL of the alternative SEPP. The VPLMN SEPP stores this range, and for further connections for subscribers from this range, it can directly connect the SEPP of the third network. The expiration time of the identifiers range could be also carried in the HTTP response.

[0038] In an embodiment, identifiers are IMSI and/or SUPI identifiers.

[0039] This provides the advantage of making use of identifiers that are currently used in communication networks. As a consequence, the use of existing identifiers reduces the need for adaption of protocols within the communication networks.

[0040] The international mobile subscriber identity (IMSI) is a number that uniquely identifies every user of a cellular network. It is stored as a 64-bit field and is sent by the mobile device to the network. It is also used for acquiring other details of the mobile in the home location register (HLR) or as locally copied in the visitor location register. IMSI analysis is the process of examining a subscriber's IMSI to identify the network the IMSI belongs to, and whether subscribers from that network may use a given network (if they are not local subscribers, this requires a roaming agreement).

[0041] Subscription Permanent Identifier (SUPI): A SUPI is a 5G globally unique Subscription Permanent Identifier (SUPI) allocated to each subscriber and defined in 3GPP specification TS 23.501. The SUPI value is provisioned in USIM and UDM/UDR function in 5G Core. A SUPI is usually a string of 15 decimal digits. The first three digits represent the Mobile Country Code (MCC) while the next two or three form the Mobile Network Code (MNC) identifying the network operator. The remaining (nine or ten) digits are known as Mobile Subscriber Identification Number (MSIN) and represent the individual user of that particular operator. SUPI is equivalent to IMSI which uniquely identifies the ME, is also a string of 15 digits.

[0042] According to a second aspect of the invention, a network entity of a second network, in particular a HPLMN SEPP, is provided that is configured to provide a list of identifiers to a network entity, in particular a VPLMN SEPP, of a first network, wherein the list enumerates identifiers that are assigned to the second network but which are hosted by a third network.

[0043] The network entity is configured to perform the steps described above in the context of the method that are technically associated to the network entity.

[0044] According to a third aspect of the invention, a further network entity of a first network, in particular a VPLMN SEPP, is provided that is configured to receive a list of identifiers by a second network, wherein the list enumerates identifiers that are assigned to the second network but which are hosted by a third network, wherein the further network entity is configured to extract an identifier of a communication request of user device and to compare the extracted identifier with the list of identifiers and to direct the communication request of the user device to the third network if the identifier associated to the user device is part of the list of identifiers.

[0045] The further network entity is configured to perform the steps described above in the context of the method that are technically associated to the further network entity.

[0046] According to a fourth aspect of the invention, a communication system is provided that is configured to perform the steps of the method described above.

[0047] In particular, the communication system comprises of the first network, of the second network, the third network, the network entity, the further network entity and communication means that connect the different networks. In particular, the communication system is a 5G communication systems. The inventive communication system provides advantages analog to the methods described above.

[0048] In the following, preferred implementation examples of the present invention are explained with reference to the accompanying figure:
Fig. 1:
shows a generic 5G core network roaming architecture with its build-in signaling security features.
Fig. 2:
shows a communication system and a method according to the invention.


[0049] In the following, numerous features of the present invention are explained in detail by means of preferred embodiments. The present disclosure is not limited to the specifically named combinations of features. Rather, the features mentioned here can be combined arbitrarily into inventive embodiments, unless this is expressly excluded below.

[0050] Fig. 1 shows a generic 5G core network roaming architecture with its build-in signaling security features: The above-mentioned in-built security mechanisms for 5G roaming are sufficient in a pure 5G roaming scenario when a 5G user is registered in a visited 5G public land mobile network (VPLMN) and establishes data connections back to the home public land mobile network (HPLMN). Such a scenario is referred to as "outbound roaming in a visited 5G network".

[0051] Fig. 2 shows a 5G communication system 1 and a method according to the invention.

[0052] The communication system 1 comprises a VPLMN SEPP 3, a HPLMN SEPP 5, a third network SEPP 7 and N32 interfaces 9 to connect the SEPPs 3, 5, 7 with each other. The SEPPs 3, 5, 7 lie at the "border" of the respective 5G core networks of the VPLMN, HPLMN and the third network. Any control plane traffic needs to pass the respective SEPPS 3, 5, 7 to get to the 5G core networks.

[0053] In step 11 a HPLMN subscriber requires connectivity within the VPLMN with his user device.

[0054] In step 13, the VPLMN SEPP 3 connects to the HPLMN SEPP 5 over the N32 interface 9. At this stage of the procedure, the VPLMN SEPP 3 has no knowledge about possible IMSI/SUPI ranges of the HPLMN network that are hosted by a third network.

[0055] In step 15, the HPLMN SEPP 5 can decrypt the communication request 11 and extract the IMSI/SUPI, which is associated to the communication request 11. If the IMSI/SUPI is not hosted by the HPLMN, then the request needs to re-directed to the network that actually hosts the respective IMSI/SUPI, namely to the third network.

[0056] Since the HPLMN knows which of its IMSIs/SUPIs are hosted by another network, in particular the third network, the service provider of the HPLMN can generate a list of the IMSIs/SUPIs hosted by the third network. The HPLMN then answers the communication request 11 by providing a list of IMSIs/SUPIs that are hosted in the third network to the VPLMN SEPP 3.

[0057] In step 17, the VPLMN SEPP 3 can store this list in its database.

[0058] In step 19, the VPLMN SEPP 3 redirects the communication request 11 to the third network SEPP 7 so that the request can be executed within the third network.

[0059] If the list of IMSIs/SUPIs is already stored in the database of the VPLMN SEPP 3 when the VPLMN SEPP 3 receives the communication request 11, then the steps 13, 15 can be skipped and the VPLMN SEPP 3 can analyze and to determine without further information to redirect the communication request 11 directly to the third network SEPP 7 if the IMSI/SUPI is part of the list. This especially greatly reduces signaling traffic between the networks.


Claims

1. A method to enable efficient communication establishment of a user device to a network in which an identifier associated to the user device is hosted, comprising the following steps:

• Providing to a first network (3) a list of identifiers by a second network (5), wherein the list enumerates identifiers that are assigned to the second network but which are hosted by a third network (7);

• The first network receives a communication request (11) from a user device requesting connectivity to the second network (5);

• The first network (3) extracts an identifier associated to the user device and compares the extracted identifier with the list of identifiers and directs the communication request of the user device to the third network (7) if the identifier associated to the user device is part of the list of identifiers.


 
2. The method of claim 1, wherein the list of identifiers comprises information about the third network.
 
3. The method of any of the claims, wherein the list of identifiers is provided by a service provider of the second network to a service provider of the first network.
 
4. The method of any of the claims, wherein the list of identifiers is provided from the second network to the first network upon receiving the communication request.
 
5. The method of any of the claims, wherein the list of identifiers comprises expiration information about at least one of the identifiers.
 
6. The method of any of the claims, wherein the first network is a VPLMN and the second network is a HPLMN, wherein the identifier associated to the user device belongs to the HPLMN.
 
7. The method of any of the claims, wherein the first network and the second network are 5G networks.
 
8. The method of claim 7, wherein the steps of the methods are executed by a SEPP of the respective network, in particular by a HPLMN SEPP and a VPLMN SEPP.
 
9. The method of claim 8, wherein the list of identifiers is stored within a database of the VPLMN SEPP.
 
10. The method of any of the claims 7 to 9, wherein the list of identifiers is provided during a N32-c setup.
 
11. The method of claim claims 7 to 10, wherein the list of identifiers is provided during a N32-f setup.
 
12. The method of any of the claims, wherein the identifiers are IMSI and/or SUPI identifiers.
 
13. A network entity of a second network, in particular a HPLMN SEPP, configured to provide a list of identifiers to a network entity, in particular a VPLMN SEPP, of a first network, wherein the list enumerates identifiers that are assigned to the second network but which are hosted by a third network.
 
14. A further network entity of a first network, in particular a VPLMN SEPP, configured to receive a list of identifiers by a second network, wherein the list enumerates identifiers that are assigned to the second network but which are hosted by a third network, wherein the further network entity is configured to extract an identifier from a communication request of user device and to compare the extracted identifier with the list of identifiers and to direct the communication request of the user device to the third network if the identifier associated to the user device is part of the list of identifiers.
 
15. A communication system configured to perform the steps of the method of any of the claims 1-12.
 




Drawing










Search report












Search report